Skip to main content

Home/ Groups/ Globaltech
Tick Kanjanamaneeroj

Thailand signs the world's largest educational tablet distribution deal - 5 views

  •  
    Will tablets benefit children for their education? How?
  •  
    Education Hardware May 17
anonymous

Asia computer market has room for both tablets and laptops - 5 views

  •  
    Why might some people want to use tablets? dec 2 nat
  •  
    Why might some people want to use tablets? They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
anonymous

Java Still Not Safe, Security Experts Say - Security - Attacks/breaches - Informationweek - 5 views

  •  
    What does Java do?  Explain the security issue. sept 12-13 kong rock
anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

Steve Jobs: His 10 Commandments - The Daily Beast - 4 views

  •  
    Ideas for success
anonymous

Gawker Hack Exposes Ridiculous Password Habits - PCWorld - 4 views

  •  
    What kinds of passwords do people use? Check Slate.com, which has created a handy tool to search the database for your username or e-mail address. What is Farhad Manjoo's advice on creating a superstrong password?
anonymous

Honestly.com (formerly Unvarnished) - Community-contributed reviews for business profes... - 4 views

  •  
    Describe the service this site provides. Explain a potential problem that could arise from the use of this site. dec 2 JH
  •  
    Diigo misses JH
  •  
    Diigo misses JH
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
anonymous

Ellison brandishes 'speed of thought' Exalytics appliance * The Register - 4 views

  • "To deliver data analytics at the speed of thought – faster than you can type – you have to change the interface because it moves so fast," Ellison bragged. "Before you finish asking a question, it can guess and give you the answer."
  •  
    What does 'speed of thought' mean? only Azman and Avik October 4
anonymous

How Do Search Engines Rank Websites? - 4 views

  •  
    Describe the major areas of search engine optimization. m12 nov 10 alec
  •  
    1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking. 2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design. 3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
anonymous

Egypt's net ruled by phone, not kill switch > DDoS > Vulnerabilities & Exploits > News ... - 4 views

  • Google operated a crisis response page and a "Speak to Tweet" service that allowed Egyptians to communicate online via voice telephone in the face of the internet blackout. Others, like net activist group Telecomix, were monitoring amateur radio channels and provided virtual private networks and proxies to Egyptian activists who required online anonymity.
  •  
    Feb 8 Ginnie What did people use when the net was down?
  •  
    1.7_surveillance 2.6_gov_control_use_info 3.4_internet
  •  
    The people used voice telephone to communicate with each other while the net was down. Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
anonymous

Strange (But Useful) Human Tricks | Can You Believe This? | eons.com - 4 views

  •  
    Just in case you wanted to know...
kuninari

How the Cloud Democratizes and Complicates Disaster Recovery | PCWorld Business Center - 4 views

  •  
    What is DR? What is problem with Laissez-Faire DR? What are the advantages and disadvantages using cloud on DR? all April 26 Martin
  •  
    What is DR? - Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions What is problem with Laissez-Faire DR? - The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked What are the advantages and disadvantages using cloud on DR? - One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data. - Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
anonymous

WikiLeaks Julian Assange Arrested in London: Is it a Conspiracy? - 4 views

  •  
    High cholesterol milk Feb 8 Who is Julian? What is wikileaks? Describe cyber attacks. How did politics impact wikileaks? How did wikileaks fight back?
  •  
     Who is Julian? - Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.  What is WikiLeaks? - WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.  Describe cyber attacks - A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.  How did politics impact WikiLeaks? - Protect citizens from knowing the secrets about politics - They keep find track on information -  How did WikiLeaks fight back? - Protesting way back Julian being treated (Letting attacks to each other)
  •  
    1.5 Intellectual property 1.9 Policies 2.6 Politics and government 3.5 Personal and public communications
Tick Kanjanamaneeroj

Tablets expected to become preferred computing device | Apple - CNET News - 4 views

  •  
    Why do people prefer tablet more than PC ? What advantages of tablet that PCs don't have?
  •  
    Selected Article Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
anonymous

Facebook tightens grip on user ID data - Yahoo! News - 4 views

  •  
    analysis Az dec 2
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment- Online business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications. 3. Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy). 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks. 7. Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

Bangkok Post : Leveraging social networks for sales - 4 views

  •  
    What does it mean to leverage social networks? Define digimarketing. Explain the mistakes marketers make with social networking. march 17 nat
  •  
    What does it mean to leverage social networks? To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. Define digimarketing. Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. Explain the mistakes marketers make with social networking. Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
anonymous

Judge Hands Over IP Logs of Several Geohot Sites to Sony - 4 views

  •  
    brief analysis march 11 nat
  •  
    Identify the area of impact the scenario relates to. Business Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers. 5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
anonymous

BBC News - Why US schools are embracing ebooks and iPads - 4 views

  •  
    Why US schools are embracing ebooks and iPads Presentation - Kong May 21
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page